General

  • Target

    9172039b9bc523742af7488b57c1ec9750a3ba0ceb683b19461053c0ebc128adN.exe

  • Size

    374KB

  • Sample

    241115-vdsk9a1pfr

  • MD5

    eae956db01bea4a88163a11bcf7cadb0

  • SHA1

    376b402a44beeaa82477c1f236e845bfee37857a

  • SHA256

    9172039b9bc523742af7488b57c1ec9750a3ba0ceb683b19461053c0ebc128ad

  • SHA512

    70a4492e97f17f710edeb934c4f8f646adf29d54ab5000752fb4c7fe3d68a04d8a0c7a33cc9d90fa883f2ad383a954c2a428e79ee547c172efdd6cf5e7b23fdb

  • SSDEEP

    6144:Kuy+bnr+Mp0yN90QEvvR10PIXkKKzoKAuLxs9dddKS79Nd:KMrAy90NR10PDKjKZLW9ddJBz

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9172039b9bc523742af7488b57c1ec9750a3ba0ceb683b19461053c0ebc128adN.exe

    • Size

      374KB

    • MD5

      eae956db01bea4a88163a11bcf7cadb0

    • SHA1

      376b402a44beeaa82477c1f236e845bfee37857a

    • SHA256

      9172039b9bc523742af7488b57c1ec9750a3ba0ceb683b19461053c0ebc128ad

    • SHA512

      70a4492e97f17f710edeb934c4f8f646adf29d54ab5000752fb4c7fe3d68a04d8a0c7a33cc9d90fa883f2ad383a954c2a428e79ee547c172efdd6cf5e7b23fdb

    • SSDEEP

      6144:Kuy+bnr+Mp0yN90QEvvR10PIXkKKzoKAuLxs9dddKS79Nd:KMrAy90NR10PDKjKZLW9ddJBz

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks